Static task
static1
Behavioral task
behavioral1
Sample
5b8aa64f691308842f8b4dd9df87a486.exe
Resource
win7-20231215-en
General
-
Target
5b8aa64f691308842f8b4dd9df87a486
-
Size
885KB
-
MD5
5b8aa64f691308842f8b4dd9df87a486
-
SHA1
21c0b284d74cf395d27d9afdbd9777d06fed97cd
-
SHA256
db007b6576b89da3ed98f3f7ed3a6122fac9e3a09aa3843b23d19553bccaf8bf
-
SHA512
20ca617b827bbd2c5a2b7553f94be7de3cd8f3da3a90b470d73e87433f95269c463906d47e7b5a23056b9b04b2c23c8a8bf2a1e69f8935aa5ff534f38439eaac
-
SSDEEP
12288:rON+8RUn36AcQ4MfOc+OJVK7UEaM5SO4zg4vPUDZpq93ZRx:rJ8a4wO/OJV7RFfKkJRx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b8aa64f691308842f8b4dd9df87a486
Files
-
5b8aa64f691308842f8b4dd9df87a486.exe windows:5 windows x86 arch:x86
cf925bacb9750c26b1c7578ee0d8f969
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetStartupInfoW
Sleep
ExitProcess
GetTimeZoneInformation
HeapAlloc
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
VirtualAlloc
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CreateFileA
SetErrorMode
FlushFileBuffers
WritePrivateProfileStringW
GlobalFlags
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
CompareStringA
InterlockedExchange
InterlockedDecrement
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
lstrcmpW
GetVersionExA
FreeResource
GetModuleHandleA
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
GetModuleFileNameW
GetFileInformationByHandle
GetFileType
GetLocalTime
FileTimeToSystemTime
GetCurrentProcess
SystemTimeToFileTime
UnmapViewOfFile
SetFilePointer
FileTimeToDosDateTime
GetModuleHandleW
GetLastError
SetLastError
WriteFile
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
GetProcAddress
lstrlenW
lstrcpynW
GetLocaleInfoW
lstrcpyW
GetNumberFormatW
MulDiv
FreeLibrary
LoadLibraryW
GetWindowsDirectoryW
GetPrivateProfileStringW
ReadFile
CloseHandle
GetFileSize
CreateFileW
CopyFileW
FindResourceW
LoadResource
LockResource
GetTickCount
SizeofResource
user32
GetSysColorBrush
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
GetCursorPos
WindowFromPoint
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
ShowWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageW
MapWindowPoints
SetMenu
SetForegroundWindow
IsWindowVisible
PostMessageW
CreateWindowExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
ClientToScreen
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UpdateWindow
GetFocus
DrawEdge
ReleaseDC
GetDC
GetParent
IsWindow
UnregisterClassW
DestroyMenu
GetKeyState
MessageBeep
SetWindowLongW
KillTimer
GrayStringW
DrawTextExW
TabbedTextOutW
DrawTextW
InflateRect
InvalidateRect
RedrawWindow
FillRect
DrawIcon
GetSystemMetrics
GetClientRect
GetSysColor
SetActiveWindow
RegisterWindowMessageW
SetCapture
SetFocus
MessageBoxW
ReleaseCapture
GetAsyncKeyState
wsprintfW
CopyIcon
LoadCursorW
SetCursor
PtInRect
ScreenToClient
GetMessagePos
SetTimer
DestroyCursor
LoadIconW
LockWindowUpdate
GetWindowRect
SendMessageW
EnableWindow
GetClassInfoExW
gdi32
CreateBitmap
CreatePen
MoveToEx
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
SelectClipRgn
DeleteObject
GetObjectW
LineTo
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateRectRgn
CreateSolidBrush
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetTextExtentPoint32W
GetBkColor
GetCurrentObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
DeleteDC
GetDeviceCaps
CreateFontIndirectW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegSetValueExW
RegOpenKeyW
RegEnumKeyW
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueW
RegCloseKey
RegOpenKeyExW
shell32
SHGetFolderPathW
ord165
ShellExecuteExW
ShellExecuteW
ExtractIconW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathAddBackslashW
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 548KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE